Ransomware, Reconnaissance and the Problem of Dwell Time

Ransomware, Reconnaissance and the Problem of Dwell Time

Ransomware has certainly captured the attention of the media and hospitals across the country.  The poster child of this trend is Hollywood…

CyberWire Podcast Features IKANOW CTO Chris Morgan

CyberWire Podcast Features IKANOW CTO Chris Morgan

The CyberWire Daily Podcast from earlier this week featured IKANOW CTO Chris Morgan. He explained the importance of quantifying risks based on…

IKANOW 1.5 Release – Giving Information Security Analysts Lightning Fast Search

IKANOW 1.5 Release – Giving Information Security Analysts Lightning Fast Search

IKANOW today released Information Security Analytics (ISA) 1.5. The release includes several new features and some of the most powerful are designed…

First Quarter Breach Report – 2016

First Quarter Breach Report – 2016

2015 was a record year for cybersecurity hacks with 3,930 data breach incidents reported. If the number of records compromised so far…

Known Knowns: The Problem with Vulnerabilities and Unmeasured Risk

Known Knowns: The Problem with Vulnerabilities and Unmeasured Risk

Vulnerabilities are growing faster than information security staff capacity. There was a time when knowing your vulnerabilities was the critical challenge in…

Will Compliance-Driven Investment Help or Hinder Information Security?

Will Compliance-Driven Investment Help or Hinder Information Security?

If information security is your objective, compliance should not be your north star. However, data show that for most organizations compliance is…

Knowns and Unknowns: What it Means to Shift from Prevention to Detection and Response

Knowns and Unknowns: What it Means to Shift from Prevention to Detection and Response

“We haven’t stopped huge breaches. The focus now is on resilience, with smarter ways to detect attacks and faster ways to respond…

50% of Information Security Professionals Lack Confidence in Their Security Solutions – no surprise there

50% of Information Security Professionals Lack Confidence in Their Security Solutions – no surprise there

Barkly recently released a survey of 350 IT professionals to gauge their confidence in the existing information security infrastructure. One key finding…

Should We Celebrate that Breach Dwell Time is Now “Only” 21 Weeks?

Should We Celebrate that Breach Dwell Time is Now “Only” 21 Weeks?

Mandiant recently released it annual The State of Cyber Attacks report and there is some potentially good news for the industry. A…

Cyberthreat Defense Report: Analytics Climbs to Must-have Application for 2016

Cyberthreat Defense Report: Analytics Climbs to Must-have Application for 2016

The Cyberthreat Defense Report that came out two weeks ago includes survey results from over 1000 IT security professionals. The survey found…

123